0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (256)
  • R250 - R500 (863)
  • R500+ (13,658)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Introduction to Microelectromechanical (MEM) Microwave Systems (Hardcover): Hector J de los Santos Introduction to Microelectromechanical (MEM) Microwave Systems (Hardcover)
Hector J de los Santos
R3,188 Discovery Miles 31 880 Ships in 18 - 22 working days

Microelectromechanical sytems (MEMS) applications in RF and microwave electronics are revolutionizing wireless communications. This text provides a comprehensive explanation of the fabrication and fundamental physics of MEMS and their applications in electronic communication systems. The book integrates circuit fabrication technology, device design-oriented materials, mechanical and microwave considerations, and RF/microwave electronics to give engineers and managers a clear understanding of the potential and limitations of MEMS in electronic communications.

Persuasive Communication for Science and Technology Leaders - Writing and Speaking with Confidence (Hardcover): S Wilbers Persuasive Communication for Science and Technology Leaders - Writing and Speaking with Confidence (Hardcover)
S Wilbers
R2,073 Discovery Miles 20 730 Ships in 18 - 22 working days

Persuasive Communication for Science and Technology Leaders Explore this insightful guide to the development of persuasive leadership skills perfect for students and managers in technical fields Many technical managers receive little or no training in the persuasive arts. Though technically skilled, they often lack the ability to engage effectively with an audiences outside their field. Persuasive Communication for Science and Technology Leaders: Writing and Speaking with Confidence delivers a thorough treatment of how to connect with audiences whose knowledge, values, personal experiences, ethnic background, gender, and worldview may differ from their own. Written in a highly readable and entertaining style, this book goes beyond the scope of a standard textbook on persuasive communication. Its practical lessons illustrate the techniques of effective scientific and technical writing while emphasizing values-based leadership for a more just, inclusive, and sustainable world, a theme that seems particularly pertinent during these times of multiple crises, misinformation campaigns, and science denial. The distinguished speaker and author explores the broader importance of language and explains various techniques for expanding your expressive range and your professional influence. He will also teach you methods for conveying information clearly and precisely as well as in ways that inspire and leave a lasting impression. You will also benefit from: A thorough introduction to knowing and connecting with your audience, using voice, tone, and point of view for results, and engaging your reader with compelling openings An exploration of explaining complex technologies clearly, succeeding with challenging writing assignments, and applying a variety of persuasive strategies for agile responses to a rapidly changing world An examination of speaking effectively while thinking on your feet, including how to create a safety net and how to recover from momentary lapses Easy-to-remember guidance on avoiding common language errors that might undermine your credibility or, worse yet, make people stop listening to you Perfect for undergraduate and graduate students in scientific and technical fields such as engineering, geology, botany, climatology, and epidemiology, Persuasive Communication for Science and Technology Leaders: Writing and Speaking with Confidence will earn a place in the libraries of technical managers and leaders who seek to better connect with their audiences.

Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover): Luis Miguel Borges,... Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover)
Luis Miguel Borges, Norberto Barroca, Periklis Chatzimisios, Fernando Jose Velez
R2,861 Discovery Miles 28 610 Ships in 10 - 15 working days

Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.

Face Recognition (Hardcover): Milos Oravec Face Recognition (Hardcover)
Milos Oravec
R3,613 Discovery Miles 36 130 Ships in 18 - 22 working days
Connectivity of Communication Networks (Hardcover, 1st ed. 2017): Guoqiang Mao Connectivity of Communication Networks (Hardcover, 1st ed. 2017)
Guoqiang Mao
R4,856 Discovery Miles 48 560 Ships in 10 - 15 working days

This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.

Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods (Hardcover, 1st ed. 2017): G.... Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods (Hardcover, 1st ed. 2017)
G. Kousalya, P. Balakrishnan, C. Pethuru Raj
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.

Hack Proofing ColdFusion (Paperback): Syngress Hack Proofing ColdFusion (Paperback)
Syngress
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.
Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at [email protected]"

Candidate Multilinear Maps (Hardcover): Sanjam Garg Candidate Multilinear Maps (Hardcover)
Sanjam Garg
R1,770 Discovery Miles 17 700 Ships in 18 - 22 working days

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

Group-target Tracking (Hardcover, 1st ed. 2017): Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong Group-target Tracking (Hardcover, 1st ed. 2017)
Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong; Translated by Ge Geng, Fan Yang
R2,645 R2,470 Discovery Miles 24 700 Save R175 (7%) Ships in 10 - 15 working days

This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the target in different quantities and densities. At the same time, it integrates cognition into the application. Group-target Tracking is designed as a book for advanced-level students and researchers in the area of radar systems, information fusion of multi-sensors and electronic countermeasures. It is also a valuable reference resource for professionals working in this field.

Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover): Maurice Dawson, Mohamed Eltayeb, Marwan Omar Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover)
Maurice Dawson, Mohamed Eltayeb, Marwan Omar
R5,374 Discovery Miles 53 740 Ships in 18 - 22 working days

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Semantic Web Technologies for Intelligent Engineering Applications (Hardcover, 1st ed. 2016): Stefan Biffl, Marta Sabou Semantic Web Technologies for Intelligent Engineering Applications (Hardcover, 1st ed. 2016)
Stefan Biffl, Marta Sabou
R4,507 Discovery Miles 45 070 Ships in 10 - 15 working days

This is the first book to explore how Semantic Web technologies (SWTs) can be used to create intelligent engineering applications (IEAs). Technology-specific chapters reflect the state of the art in relevant SWTs and offer guidelines on how they can be applied in multi-disciplinary engineering settings characteristic of engineering production systems. In addition, a selection of case studies from various engineering domains demonstrate how SWTs can be used to create IEAs that enable, for example, defect detection or constraint checking. Part I "Background and Requirements of Industrie 4.0 for Semantic Web Solutions" provides the background information needed to understand the book and addresses questions concerning the semantic challenges and requirements of Industrie 4.0, and which key SWT capabilities may be suitable for implementing engineering applications. In turn, Part II "Semantic Web-Enabled Data Integration in Multi-Disciplinary Engineering" focuses on how SWTs can be used for data integration in heterogeneous, multi-disciplinary engineering settings typically encountered in the creation of flexible production systems. Part III "Creating Intelligent Applications for Multi-Disciplinary Engineering" demonstrates how the integrated engineering data can be used to support the creation of IEAs, while Part IV "Related and Emerging Trends in the Use of Semantic Web in Engineering" presents an overview of the broader spectrum of approaches that make use of SWTs to support engineering settings. A final chapter then rounds out the book with an assessment of the strengths, weaknesses and compatibilities of SWTs and an outlook on future opportunities for applying SWTs to create IEAs in flexible industrial production systems. This book seeks to build a bridge between two communities: industrial production on one hand and Semantic Web on the other. Accordingly, stakeholders from both communities should find this book useful in their work. Semantic Web researchers will gain a better understanding of the challenges and requirements of the industrial production domain, offering them guidance in the development of new technologies and solutions for this important application area. In turn, engineers and managers from engineering domains will arrive at a firmer grasp of the benefits and limitations of using SWTs, helping them to select and adopt appropriate SWTs more effectively. In addition, researchers and students interested in industrial production-related issues will gain valuable insights into how and to what extent SWTs can help to address those issues.

Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017): Nilanjan Dey, V. Santhi Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017)
Nilanjan Dey, V. Santhi
R4,903 Discovery Miles 49 030 Ships in 10 - 15 working days

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Cloud Computing for Optimization: Foundations, Applications, and Challenges (Hardcover, 1st ed. 2018): Bhabani Shankar Prasad... Cloud Computing for Optimization: Foundations, Applications, and Challenges (Hardcover, 1st ed. 2018)
Bhabani Shankar Prasad Mishra, Himansu Das, Satchidananda Dehuri, Alok Kumar Jagadev
R4,167 R3,596 Discovery Miles 35 960 Save R571 (14%) Ships in 10 - 15 working days

This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems - ranging from social science to engineering sciences - can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.

Fundamentals of Smart Contract Security (Paperback): Richard Ma, Jan Gorzny, Edward Zulkoski Fundamentals of Smart Contract Security (Paperback)
Richard Ma, Jan Gorzny, Edward Zulkoski
R1,048 R876 Discovery Miles 8 760 Save R172 (16%) Ships in 18 - 22 working days
Innovations in Software-Defined Networking and Network Functions Virtualization (Hardcover): Ankur Dumka Innovations in Software-Defined Networking and Network Functions Virtualization (Hardcover)
Ankur Dumka
R5,819 Discovery Miles 58 190 Ships in 18 - 22 working days

The advancement of technology is a standard of modern daily life, whether it be the release of a new cellphone, computer, or a self-driving car. Due to this constant advancement, the networks on which these technologies operate must advance as well. Innovations in Software-Defined Networking and Network Functions Virtualization is a critical scholarly publication that observes the advances made in network infrastructure through achieving cost efficacy while maintaining maximum flexibility for the formation and operation of these networks. Featuring coverage on a broad selection of topics, such as software-defined storage, openflow controller, and storage virtualization, this publication is geared toward professionals, computer engineers, academicians, students, and researchers seeking current and relevant research on the advancements made to network infrastructures.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover): Michelle Moore Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover)
Michelle Moore
R4,916 Discovery Miles 49 160 Ships in 18 - 22 working days

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Cosine-/Sine-Modulated Filter Banks - General Properties, Fast Algorithms and Integer Approximations (Hardcover, 1st ed. 2018):... Cosine-/Sine-Modulated Filter Banks - General Properties, Fast Algorithms and Integer Approximations (Hardcover, 1st ed. 2018)
Vladimir Britanak, K.R. Rao
R5,328 Discovery Miles 53 280 Ships in 18 - 22 working days

This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.

Communication and Computing for Distributed Multimedia Systems (Hardcover): Guojun Lu Communication and Computing for Distributed Multimedia Systems (Hardcover)
Guojun Lu
R3,536 Discovery Miles 35 360 Ships in 18 - 22 working days

Here's the first focused discussion of issues and technology in developing networked multimedia systems. This book includes a unique explanation of color specification and its role in achieving high picture quality, high compression ratio and high information retrieval performance, plus valuable coverage of principles and techniques of multimedia information indexing and retrieval critical for future systems.

Broadband - Business Services, Technologies and Strategic Impact (Hardcover): David Wright Broadband - Business Services, Technologies and Strategic Impact (Hardcover)
David Wright
R3,280 Discovery Miles 32 800 Ships in 18 - 22 working days

Broadband technology is ushering the telecom industry through a unique period of change with profound business implications for suppliers and users. This single source describes the four major broadband technologies that are shaping telecommunications networks: frame relay; optical fiber (including SONET); distributed queue dual bus (DQDB); and asynchronous transfer mode (ATM).

Mass Customization for Personalized Communication Environments - Integrating Human Factors (Hardcover): Constantinos Mourlas,... Mass Customization for Personalized Communication Environments - Integrating Human Factors (Hardcover)
Constantinos Mourlas, Panagiotis Germanakos
R4,569 Discovery Miles 45 690 Ships in 18 - 22 working days

Mass customization and personalization are widely appreciated as viable and promising strategies which aim to provide products and services that best serve individuals' personal needs with near mass production efficiency. ""Mass Customization for Personalized Communication Environments: Integrating Human Factors"" focuses on the customization of services and communication environments to advance user satisfaction and provide a total redefinition of the way goods and services are created or sold and customers and vendors interact. This authoritative collection of chapters offers relevant theoretical foundations, principles, methodologies, frameworks, and best practices within the field of research.

Advances in Geocomputation - Geocomputation 2015--The 13th International Conference (Hardcover, 1st ed. 2017): Daniel A.... Advances in Geocomputation - Geocomputation 2015--The 13th International Conference (Hardcover, 1st ed. 2017)
Daniel A. Griffith, Yongwan Chun, Denis J. Dean
R7,352 R6,481 Discovery Miles 64 810 Save R871 (12%) Ships in 10 - 15 working days

This book contains refereed papers from the 13th International Conference on GeoComputation held at the University of Texas, Dallas, May 20-23, 2015. Since 1996, the members of the GeoComputation (the art and science of solving complex spatial problems with computers) community have joined together to develop a series of conferences in the United Kingdom, New Zealand, Australia, Ireland and the United States of America. The conference encourages diverse topics related to novel methodologies and technologies to enrich the future development of GeoComputation research.

Fundamentals of Network Security (Hardcover): John E. Canavan Fundamentals of Network Security (Hardcover)
John E. Canavan
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.

Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R689 R618 Discovery Miles 6 180 Save R71 (10%) Ships in 18 - 22 working days
Amazon CloudWatch User Guide (Hardcover): Documentation Team Amazon CloudWatch User Guide (Hardcover)
Documentation Team
R1,718 Discovery Miles 17 180 Ships in 18 - 22 working days
The Future Internet - Alternative Visions (Hardcover, 1st ed. 2015): Jenifer Winter, Ryota Ono The Future Internet - Alternative Visions (Hardcover, 1st ed. 2015)
Jenifer Winter, Ryota Ono
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

Readers seeking to gain a handle on the internet's global expansion will find this book rich in scholarly foundations combined with cutting-edge discussion of emerging ICTs and services and the complex societal contexts in which they are embedded. To explore possibilities to the fullest extent, a sociotechnical systems approach is employed, focusing on the interplay of technical, social, cultural, political, and economic dynamics to explore alternative futures (ones that are not part of the dominant discourse about the internet). These shared perspectives are not well addressed elsewhere in current discussions. Awareness of these dynamics, and the fluidity of the future, is important, as humankind moves forward into the uncertain future. Due to the sociotechnical complexity of the Internet, policymakers, businesspeople, and academics worldwide have struggled to keep abreast of developments. This volume's approach is intended to stimulate dialogue between academics and practitioners on a topic that will affect most aspects of human life in the near-term future.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cybersecurity 2021
Carl Freeman Hardcover R1,039 R877 Discovery Miles 8 770
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210

 

Partners